Category Started On Completed On Duration Cuckoo Version
FILE 2018-03-14 21:52:20 2018-03-14 21:54:28 128 seconds 1.2

File Details

File name e4e97090e9fd6cc3d321cee5799efd1806b5d8a9dea7c4872044057eb1c486ff
File size 348891 bytes
File type Java archive data (JAR)
CRC32 D9C819BA
MD5 f48122e9f4333ba3bb77fac869043420
SHA1 02cc4cd5fbe40983ce084b9fa92d75c1d3da4954
SHA256 e4e97090e9fd6cc3d321cee5799efd1806b5d8a9dea7c4872044057eb1c486ff
SHA512 fe6b244a9b84ec76ec8c0c28ae0b30ebd8de4c5aa43a9b6269b1d7358d8ec5c0a8fc8bd99bdbf0f71d2e68fc08e71882731b15eb4141109b3de5fd4b7d90e791
Ssdeep 6144:AVknR9v8MnFle/shzyqEZd5KDixU5YBqukraN5jGh2fQzwETloY:AoUMFlzhzw50iEKKaNWFvTSY
PEiD None matched
Yara None matched
VirusTotal Permalink
VirusTotal Scan Date: 2017-12-21 04:29:44
Detection Rate: 37/61 (Expand)

Android Application Info

Package com.example.loader
Main Activity com.example.loader.MainActivity

Activities

Services

Receivers

Permissions

Signatures

Application Dropped Files (Dynamic)
Application Fingerprint (Dynamic)
File has been identified by at least one AntiVirus on VirusTotal as malicious (Osint)
Application Contains Shared Object Files (Static)
Application Registered Receiver In Runtime (Dynamic)
Performs some HTTP requests
Umeng Adware (Detection)
Application Asks For Dangerous Permissions (Static)
File has been identified by more the 10 AntiVirus on VirusTotal as malicious (Osint)
Hidden Payload Found (Static)
Application Contains APK (Static)
Application Uses Reflection (Dynamic)
Application Set Component Enabled Setting (Dynamic)

Android Dynamic Analysis

Shell Commands

Dynamically Loaded Files

Registered Broadcast Receivers

Reflection Calls

Fingerprints

Shared Preferences

Content Values

Files Accessed By Application

System Properties

Android Static Analysis

Screenshots

Network Analysis

Hosts Involved

DNS Requests

HTTP Requests

Dynamic HTTP/HTTPS Requests

Volatility

Nothing to display.